Common use of Access to Computer Systems Clause in Contracts

Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files or electronic data storage system owned or controlled by the other Party, the accessing Party will limit its access and use solely to that which is required to receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, clean-room, electronic files or electronic data storage system, other than those specifically required to receive the Services. Subject to the restrictions provided herein, each Party shall provide the other Party’s personnel with reasonable physical access to all sites and rooms where those systems reside, if reasonably needed to perform the Services. Each Party shall limit access to those persons with a requirement to have access under this Agreement, advise the other Party in writing of the name of each person who will be granted access if requested to do so, and strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files and electronic data storage systems owned or controlled by the other Party, will be considered and treated as Confidential Information under this Agreement. The Parties shall cooperate in the investigation of any apparent unauthorised access to any equipment, computer, software, network, clean-room, electronic file or electronic data storage systems owned or controlled by the other Party, or any apparent unauthorised release of Confidential Information.

Appears in 4 contracts

Sources: Transitional Services Agreement (Maxeon Solar Technologies, Ltd.), Transitional Services Agreement (Maxeon Solar Technologies, Ltd.), Transitional Services Agreement (Maxeon Solar Technologies, Ltd.)

Access to Computer Systems. If a Party is given access to any equipment, computer, software, network, electronic files or electronic data storage system owned or controlled by the other PartyParties, the accessing Party will limit its access and use solely to that which is required to receive Services under this Agreement and shall not access or attempt to access any equipment, computer, software, network, clean-room, electronic files or electronic data storage system, other than those specifically required to receive the Services. Subject to the restrictions provided herein, each Party shall provide the other Party’s Parties' personnel with reasonable physical access to all sites and rooms where those systems reside, if reasonably needed to perform the Services. Each Party shall limit access to those persons with a requirement to have access under this Agreement, advise the other Party Parties in writing of the name of each person who will be granted access if requested to do so, and strictly follow all security rules and procedures for use of electronic resources. All user identification numbers and passwords disclosed to a Party and any Confidential Information obtained by a Party as a result of their access to and use of any equipment, computers, software, networks, clean-rooms electronic files and electronic data storage systems owned or controlled by the other PartyParties, will be considered and treated as Confidential Information under this Agreement. The Parties shall cooperate in the investigation of any apparent unauthorised access to any equipment, computer, software, network, clean-room, electronic file or electronic data storage systems owned or controlled by the other PartyParties, or any apparent unauthorised release of Confidential Information.

Appears in 1 contract

Sources: Transitional Services Agreement (Maxeon Solar Technologies, Ltd.)